Amber Group uses simple hardware to show just how fast, easy the Wintermute hack was

Share This Post

The Hong Kong-based group documented its reproduction of the hack on its tech and security oriented blog, seeking insights into Web3’s attack surface spectrum.

Amber Group has reproduced the recent Wintermute hack, the Hong Kong-based crypto finance service provider announced on its blog. The process was fast and simple, and used hardware easily accessible to consumers. Wintermute lost over $160 million in a private key hack on Sept. 20.

Reproducing the hack can help “build a better understanding of the attack surface spectrum across Web3,” Amber Group said. It was only hours after the hack of UK-based crypto market maker Wintermute was revealed that researchers were able to pin the blame for it on the Profanity vanity address generator.

One analyst suggested that the hack had been an inside job, but that conclusion was rejected by Wintermuteand others. The Profanity vulnerability was already known before the Wintermute hack.

Amber Group was able to reproduce the hack in less than 48 hours after preliminary setup that took less than 11 hours. Amber Group used a Macbook M1 with 16GB RAM in its research. That was far speedier, and used more modest equipment, than how a previous analyst had estimated the hack would play out, Amber Group noted.

Related: The impact of the Wintermute hack could have been worse than 3AC, Voyager and Celsius — Here is why

Amber Group detailed the process it used in the re-hack, from obtaining the public key to reconstructing the private one, and it described the vulnerability in the way Profanity generates random numbers for the keys it produces. The group notes that its description “does not purport to be complete.” It added, repeating a message that has often been spread before:

“As well documented by this point — your funds are not safe if your address was generated by Profanity […] Always manage your private keys with caution. Don’t trust, verify.”

The Amber Group blog has been technically oriented from its inception, and has addressed security issues before. The group achieved a $3-billion valuation in February after a Series B+ funding round.

Read Entire Article
spot_img
- Advertisement -spot_img

Related Posts

IRS: Frozen Crypto Rewards Taxable Despite Account Lockdowns

Crypto rewards received before an account freeze are taxable in the year they’re received, even if holders can’t access their funds later, the IRS says IRS Clarifies Tax Rules for Digital Assets

Machine Learning Algorithm Predicts 109% Surge For Shiba Inu Price, The Timeline Is Shocking

The Shiba Inu price has seen a slight decline over the past 24 hours, suggesting that some traders may be taking profits after its recent price rally that peaked at $000001972 This dip, however,

Tracking Bitcoin’s Profit Cycles: Could A New Market High Be Near?

Bitcoin price has seen many cycles over the years, marked by distinct growth phases, peaks, and corrections To better understand these cycles, a CryptoQuant analyst, using the pseudonym

Unprecedented Bitcoin Rally Looms With Crypto Market Poised for Record Highs

Bitcoin could skyrocket to record highs if Trump wins the election, driven by pro-crypto policies, deregulation, and surging investor demand, predicts Devere Group’s CEO A Historic Bitcoin Rise

Enhancing Blockchain Privacy: The Role of Zero-Knowledge Proofs in Secure Transactions

The post Enhancing Blockchain Privacy: The Role of Zero-Knowledge Proofs in Secure Transactions appeared first on Coinpedia Fintech News Introduction  We live in a world of information, where

SEC Crackdown Costs Crypto Firms $426 Million: Gensler’s Compliance Mandate Hits Hard

Blockchain Association, a crypto-focused lobby group, announced that crypto companies have spent around $426 million fighting lawsuits filed by the US Securities and Exchange Commission (SEC) under